Secure Multi-Party Computation over Networks(Special Issue on Algorithm Engineering : Surveys)
スポンサーリンク
概要
- 論文の詳細を見る
Consider a set of parties who do not trust each other but want to compute some agreed function of their inputs in a secure way. This problem is known as multi-party computation. It has various interesting applications including election over the internet, electric contracts, private and secret database, joint signatures, and others. A number of techniques for the problem have been proposed. Secure protocols for multipaty computation known so far are mainly based on threshold secret sharing, verifiable secret sharing, zero-knowledge proofs, and error-correcting codes. We survey important and interesting results on secure multi-party computation under the exixtence of various types of adversaries.
- 社団法人電子情報通信学会の論文
- 2000-03-25
著者
-
Nishitani Yasuaki
Department Of Computer Science Gunma University
-
Igarashi Yoshihide
Department Of Computer Science Gunma University
関連論文
- Information Disseminating Schemes and Their Fault Tolerance in Hypercubes
- Optimal Time Broadcasting Schemes in Faulty Star Graphs (Special Section on Discrete Mathematics and Its Applications)
- Reliable Broadcasting and Secure Distributing in Channel Networks(Special Section on Discrete Mathematics and Its Applications)
- Independent Spanning Trees of Product Graphs and Their Construction
- Nonadaptive Fault-Tolerant File Transmission in Rotator Graphs (Special Section on Discrete Mathematics and Its Applications)
- Broadcasting in Hypercubes with Randamly Distributed Byzantine Faults
- Embeddings of Hyper-Rings in Hypercubes
- REMARKS ON REAL-TIME DETERMINISTIC CONTEXT-FREE LANGUAGES(Mathematical Theories on Computing Schemes and Their Applications)
- Roughly Sorting: Sequential and Parallel Approach
- Simple Mutual Exclusion Algorithms Based on Bounded Tickets on the Asynchronous Shared Memory Model (Special Issue on Selected Papers from LA Symposium)
- Highly Concurrent Group Mutual Exclusion Algorithms Based on Ticket Ordersl(Foundations of Computer Science)
- Construction of Secret Key Exchange Spanning Trees by Random Deals of Cards on Hierarchical Structures (Special Section on Discrete Mathematics and Its Applications)
- Secure Multi-Party Computation over Networks(Special Issue on Algorithm Engineering : Surveys)
- Analysis of Some Lockout Avoidance Algorithms for the k-Exclusion Problem
- Roughly Sorting: A Generalization of Sorting